Register
|
Login
Full Text
Author
Title
Submit manuscript
About
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2765)
Editorial
(423)
by Journal
by Funding Agency
Clear filters
Powered by
Articles
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
6
7
8
9
10
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
A Systematic Mapping of Configuration Management Activities in Software Product Line
Gonzalo P. Espinel-Mena
,
José L. Carrillo-Medina
,
Eddie E. Galarza
,
Mario Matias Urbieta
10.3897/jucs.110887
28-10-2024
Unique: 1402 | Total: 1862
Access Period: 0
0
1484-1510
HTML
PDF
Research Article
Microservices Patterns Recommendation based on Information Retrieval
Álex dos Santos Moura
,
Fábio Gomes Rocha
,
Michel S. Soares
10.3897/jucs.108974
28-10-2024
Unique: 1271 | Total: 1767
Access Period: 0
0
1455-1483
HTML
PDF
Editorial
Editorial
Christian Gütl
10.3897/jucs.139725
28-10-2024
Unique: 954 | Total: 1255
Access Period: 0
0
1453-1454
HTML
PDF
Research Article
Recognition of Real-Time Video Activities Using Stacked Bi-GRU with Fusion-based Deep Architecture
Ujwala Thakur
,
Ankit Vidyarthi
,
Amarjeet Prajapati
10.3897/jucs.113095
28-09-2024
Unique: 1354 | Total: 1797
Access Period: 0
0
1424-1452
HTML
PDF
Research Article
Cross-device Portability of Machine Learning Models in Electromagnetic Side-Channel Analysis for Forensics
Lojenaa Navanesan
,
Nhien-An Le-Khac
,
Yossi Oren
,
Kasun De Zoysa
,
Asanka P. Sayakkara
10.3897/jucs.109788
28-09-2024
Unique: 1663 | Total: 2287
Access Period: 0
0
1390-1423
HTML
PDF
Research Article
Improving temporal behavior based on students’ traces in online-based learning environments
Houda Tadjer
,
Zohra Mehenaoui
,
Yacine Lafifi
,
Amira Chemmakh
10.3897/jucs.110356
28-09-2024
Unique: 1416 | Total: 1946
Access Period: 0
0
1372-1389
HTML
PDF
Research Article
Accessibility Barriers for Blind Students in Teaching-learning Systems
Michele dos Santos Soares
,
Cássio Andrade Furukawa
,
Maria Istela Cagnin
,
Débora Maria Barroso Paiva
10.3897/jucs.106239
28-09-2024
Unique: 1376 | Total: 1927
Access Period: 0
0
1343-1371
HTML
PDF
Research Article
Smart healthcare: developing a pattern to predict the stress and anxiety among university students using machine learning technology
Farhad Lotfi
,
Branka Rodić
,
Aleksandra Labus
,
Zorica Bogdanović
10.3897/jucs.116174
28-09-2024
Unique: 1636 | Total: 2413
Access Period: 0
0
1316-1342
HTML
PDF
Research Article
Automatic Detection of Systemic Diseases to Recognize Mpox Virus using GPLNet Based on Skin Lesions
Panji Bintoro
,
Zulkifli Zulkifli
,
Yaya Heryadi
,
Fitriana Fitriana
,
Nopi Anggista Putri
,
Dwi Yana Ayu Andini
10.3897/jucs.119234
28-09-2024
Unique: 1537 | Total: 2119
Access Period: 0
0
1286-1315
HTML
PDF
Editorial
Editorial
Christian Gütl
10.3897/jucs.137611
28-09-2024
Unique: 994 | Total: 1306
Access Period: 0
0
1284-1285
HTML
PDF
Research Article
Recognition of genuine and phishing emails may not be associated with response to phishing attacks
Alex Crgol
,
Simon Vrhovec
Part of: Fighting Cybersecurity Risks from a Multidisciplinary Perspective
10.3897/jucs.132113
14-09-2024
Unique: 1502 | Total: 2137
Access Period: 0
0
1265-1283
HTML
PDF
Research Article
Using CVSS scores can make more informed and more adapted Intrusion Detection Systems
Robin Duraz
,
David Espes
,
Julien Francq
,
Sandrine Vaton
Part of: Fighting Cybersecurity Risks from a Multidisciplinary Perspective
10.3897/jucs.131659
14-09-2024
Unique: 1310 | Total: 1782
Access Period: 0
0
1244-1264
HTML
PDF
6
7
8
9
10
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK